QUESTION 475Which of the following technologies enables port sharing on a single physical port?

A. WWPNB. NPIVC. WWNND. Port mapping

Answer: B

QUESTION 476When a firewall takes an incoming request for a specific IP address and redirects it to an internal host, which of the following is being used?

A. NISB. PATC. NATD. NIC

Answer: C

QUESTION 477A small software development company wants to provide four of their developers with the ability to create four or five VMs each. The company also wants to be able to share all of the VM images and snapshots on a NAS. Which of the following would meet these objectives at the lowest cost?

QUESTION 478The Chief Information Officer (CIO) has established the requirement to limit data loss to within two hours of a disaster. Which of the following terms describes this requirement?

A. RTOB. RPOC. MTTRD. MTBF

Answer: B

QUESTION 479An educational institution would like to install hypervisors for a new cloud development class with very limited funding. Which of the following hypervisors is MOST likely to be selected by the institution?

A. Type IIB. Type IC. Open sourceD. Proprietary

Answer: A

QUESTION 480A company is implementing a private cloud infrastructure and is testing its high availability components. In a planned outage test, all systems will be shut down sequentially. Which of the following would be the LAST area to shut down?

A. Offsite mirrorB. NetworkingC. HypervisorsD. Storage

Answer: A

QUESTION 481When is chargeback, when using private cloud infrastructure in a large company, helpful to an organization?

A. When the company wants to allocate cost to a specific department.B. When the company needs to capitalize their cloud computing costsC. When the company needs a line of credit for a set amount of resources short term.D. When the company wants to charge the service provider for unused resources.

Answer: A

QUESTION 482Tenants in a shared datacenter environment are concerned with the privacy of their data as it moves from the application to the database servers in clear text. Which of the following can the provider implement to isolate tenants’ data?

A. Bandwidth hard limitsB. ReservationsC. Resource poolingD. VLANs

Answer: D

QUESTION 483A company is migrating to the cloud and needs to implement a security policy. Which of the following should the company implement?

QUESTION 484A company is testing a new software product that is intended for auto discovery of assets within a cloud environment. The testing department wants to ensure that initial testing does not allow the product to leave the boundary of the test environment. Which of the following should the network administrator implement in the department test environment?

A. ACLsB. DMZC. IDSD. SNMP

Answer: A

QUESTION 485Which of the following data replication methods provides the shortest RPO?